Establishing a trusted login procedure
First Claim
1. A computer-implemented method for a trusted login procedure, comprising:
- receiving, at a first server that provides a first service and from a terminal, a first login request for the first service;
generating, by a hardware processor at the first server, device identifier information of the terminal;
associating, by the hardware processor at the first server, the device identifier information of the terminal with first login state information, wherein the first login state information indicates that the terminal was verified and has logged into the first server successfully;
transmitting, to a second server, the device identifier information and the first login state information, wherein the second server provides a second service that has a trusted login relationship with the first service, wherein the second server establishes second login state information for the second service based on the first login state information, and wherein the second server associates the device identifier information of the terminal with the second login state information;
receiving, at the first server and from the second server, a validity query;
determining, by the hardware processor at the first server, whether the terminal has a valid login state with the first server;
transmitting, by the hardware processor at the first server, a validity response to the second server, wherein the validity response indicates whether the terminal has the valid login state with the first server; and
in response to transmission of the validity response to the second server, transmitting an access response from the second server to the terminal indicating the success or failure of the trusted login procedure.
3 Assignments
0 Petitions
Accused Products
Abstract
A first login request for the first service is received at a first server that provides a first service and from a terminal. Device identifier information of the terminal is generated by a hardware processor at the first server. The device identifier information of the terminal is associated, by the hardware processor at the first server, with first login state information. The first login state information indicates that the terminal has logged into the first server. The device identifier information and the first login state information are transmitted to a second server. The second server provides a second service that has a trusted login relationship with the first service.
12 Citations
14 Claims
-
1. A computer-implemented method for a trusted login procedure, comprising:
-
receiving, at a first server that provides a first service and from a terminal, a first login request for the first service; generating, by a hardware processor at the first server, device identifier information of the terminal; associating, by the hardware processor at the first server, the device identifier information of the terminal with first login state information, wherein the first login state information indicates that the terminal was verified and has logged into the first server successfully; transmitting, to a second server, the device identifier information and the first login state information, wherein the second server provides a second service that has a trusted login relationship with the first service, wherein the second server establishes second login state information for the second service based on the first login state information, and wherein the second server associates the device identifier information of the terminal with the second login state information; receiving, at the first server and from the second server, a validity query; determining, by the hardware processor at the first server, whether the terminal has a valid login state with the first server; transmitting, by the hardware processor at the first server, a validity response to the second server, wherein the validity response indicates whether the terminal has the valid login state with the first server; and in response to transmission of the validity response to the second server, transmitting an access response from the second server to the terminal indicating the success or failure of the trusted login procedure. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable medium storing instructions which, when executed, cause a computer to perform operations comprising:
-
receiving, at a first server that provides a first service and from a terminal, a first login request for the first service; generating, by a hardware processor at the first server, device identifier information of the terminal; associating, by the hardware processor at the first server, the device identifier information of the terminal with first login state information, wherein the first login state information indicates that the terminal was verified and has logged into the first server successfully; transmitting, to a second server, the device identifier information and the first login state information, wherein the second server provides a second service that has a trusted login relationship with the first service, wherein the second server establishes second login state information for the second service based on the first login state information, and wherein the second server associates the device identifier information of the terminal with the second login state information; receiving, at the first server and from the second server, a validity query; determining, by the hardware processor at the first server, whether the terminal has a valid login state with the first server; transmitting, by the hardware processor at the first server, a validity response to the second server, wherein the validity response indicates whether the terminal has the valid login state with the first server; and in response to transmission of the validity response to the second server, transmitting an access response from the second server to the terminal indicating the success or failure of the trusted login procedure. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A first server, comprising:
-
a hardware processor; and a non-transitory computer-readable storage medium coupled to the hardware processor and storing programming instructions for execution by the hardware processor, wherein the programming instructions, when executed, cause the hardware processor to perform operations comprising; receiving, at the first server that provides a first service and from a terminal, a first login request for the first service; generating, by the hardware processor at the first server, device identifier information of the terminal; associating, by the hardware processor at the first server, the device identifier information of the terminal with first login state information, wherein the first login state information indicates that the terminal was verified and has logged into the first server successfully; transmitting, to a second server, the device identifier information and the first login state information, wherein the second server provides a second service that has a trusted login relationship with the first service, wherein the second server establishes second login state information for the second service based on the first login state information, and wherein the second server associates the device identifier information of the terminal with the second login state information; receiving, at the first server and from the second server, a validity query; determining, by the hardware processor at the first server, whether the terminal has a valid login state with the first server; transmitting, by the hardware processor at the first server, a validity response to the second server, wherein the validity response indicates whether the terminal has the valid login state with the first server; and in response to transmission of the validity response to the second server, transmitting an access response from the second server to the terminal indicating the success or failure of the trusted login procedure. - View Dependent Claims (12, 13, 14)
-
Specification